BSSFFS: blockchain-based sybil-secured smart forest fire surveillance

S Datta, S Kumar, D Sinha, AK Das - Journal of Ambient Intelligence and …, 2022 - Springer
Forest fires can have multiple engenderers including lighting and thunder, unauthorized
human exercises, and unrestrained fire projects. In addition to precautions, quick detection …

Improvement on OTP authentication and a possession-based authentication framework

S Zhao, W Hu - International Journal of Multimedia …, 2018 - inderscienceonline.com
Authentication plays a paramount role in online services. Today many online services are
still using password as single authentication method, but this is not considered secure any …

[PDF][PDF] Secure QR-code generation in healthcare

SS Abdul-Jabbar - Karbala International Journal of Modern Science, 2023 - iasj.net
QR codes have become ubiquitous across several industries, including e-commerce,
education, and healthcare. In the healthcare sector, QR codes are increasingly used to relay …

Security Vulnerabilities of Popular Multifactor Authentication Methods and a Remedy.

S Zhao - Journal of Network & Information Security, 2023 - search.ebscohost.com
Authentication is of paramount importance for online services. Many online services are still
using password as single authentication method, but this is not considered secure any more …

[PDF][PDF] Authenticate and Verification Source Files using SHA256 and HMAC Algorithms

W Uriawan, R Ramadita, RD Putra, RI Siregar… - 2024 - preprints.org
Because data authenticity and validity are becoming more and more of a concern in the
digital age file security and integrity must be guaranteed. This paper investigates the …

Improvement on Security of SMS Verification Codes

S Zhao - Software Engineering Research, Management and …, 2020 - Springer
Nowadays many online service providers use SMS verification codes as a major or
supplementary authentication method to verify identity of the user. However, we notice that …

Enhanced MAC based on Hybrid-MD Algorithm

M Muslim, S Suarga, F Umar… - 2018 2nd East …, 2018 - ieeexplore.ieee.org
In the digital era like now almost all transactions are done in online. However, information on
the results of transactions sent through digital communication channels are very vulnerable …

[引用][C] An enhanced hash-based message authentication code using bcrypt

JB Alimpia, AM Sison, RP Medina - Proceedings of the International Journal for …, 2018